TITLE: avast! Anti-Virus Engine Malformed ZIP/CAB Archive Virus Detection Bypass
SECUNIA ADVISORY ID: SA17126 VERIFY ADVISORY: http://secunia.com/advisories/17126/ CRITICAL: Not critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: avast! for Kerio 4.x http://secunia.com/product/5852/ DESCRIPTION: fRoGGz has discovered a weakness in avast! Anti-Virus scan engine, which can be exploited by malware to bypass certain scanning functionality. The weakness is caused due to an error in parsing certain malformed archives and can be exploited via a specially crafted archive with additional characters prepended to the header. Such malformed archives can be correctly extracted by some archiving software. Successful exploitation allows malware packed in malformed archives to pass the email anti-virus scanning gateway undetected. The weakness has been confirmed in avast! for Kerio version 4.6.313 (Vps 0541-1) when scanning an email containing malformed ".zip" and ".cab" archives. Other versions may also be affected. NOTE: This is not an issue on client systems, as the malware is still detected upon execution by the desktop on-access scanner. SOLUTION: Desktop on-access scanner should be used to ensure that the malware is detected upon extraction. Filter all compressed file archives at border gateways if they are not required. ORIGINAL ADVISORY: http://shadock.net/secubox/AVCraftedArchive.html ============= PCWorks Mailing List ================= Don't see your post? Check our posting guidelines & make sure you've followed proper posting procedures, http://pcworkers.com/rules.htm Contact list owner <[EMAIL PROTECTED]> Unsubscribing and other changes: http://pcworkers.com =====================================================
